Expert analysis
Encryption – The Missing Defence Tool In Many Companies’ Security Policy
Over the last few years, protection against external attacks has been the main focus of information security policies and purchases but this has caused the other aspects of …
Browser Identification For Web Applications
Browser Identification is not a new concept. With the focus having shifted to desktops from networks and servers, a topic such as remote browser identification needs to be …
Snort on Window Server 2003
The setup the author is discussing is running Snort 2.3.3 on Windows Server 2003 with PHP5 and SQL 2000 SP4. All other components are also the latest available for public use. …
Security Risks Associated With Portable Storage Devices
It seems that nearly every new electronic device on the market today comes equipped with data storage and transfer capabilities. From USB sticks to smart phones, MP3 players …
Securing Storage: Complete Data Erasure on Storage Systems
Out of sight, out of mind. When storage systems are upgraded, retired due to proactive maintenance, reach the end of their lease, or are repurposed or resold, companies often …
The Key to Compliance
In the wake of the Enron and Worldcom accounting scandals, the regulations an enterprise implements to ensure its integrity are open to increasing scrutiny. This has given …
How well do you know your partner?
For those of you who follow the news, you may have read the recent story of spy software discovered at some of Israel’s leading companies which reads just like the spy …
An Introduction to Securing Linux with Apache, ProFTPd and Samba
While the vast majority of Linux users are hard-core techies, some may be using Linux because they want to try something new, are interested in the technology, or simply …
Gerhard Eschelbeck on the Common Vulnerability Scoring System (CVSS)
Gerhard Eschelbeck is the CTO & Vice President of engineering of Qualys. In this audio Mr. Eschelbeck discusses the Common Vulnerability Scoring System (CVSS), the …
Does Firefox Really Provide More Security Than Internet Explorer?
Introduction Internet Explorer is a graphical web browser made by Microsoft and comes integrated with Windows. Even though it’s by far the most widely used browser, …
Domain Footprinting for Web Applications and Web Services
A wide array of services, from banking and finance transactions to auctions and ticket reservations, are being offered to customers online. This means that an Internet …
Web Application Defense At The Gates – Leveraging IHttpModule
Web applications are vulnerable to many attacks, mainly due to poor input validation at the source code level. Firewalls can block access to ports but once a web application …
Featured news
Resources
Don't miss
- Building cyber talent through competition, residency, and real-world immersion
- Browser agents don’t always respect your privacy choices
- Anubis: Open-source web AI firewall to protect from scraper bots
- Session tokens give attackers a shortcut around MFA
- AI isn’t one system, and your threat model shouldn’t be either